RSS feed Get our RSS feed

News by Topic

oggi

Results 1 - 25 of 115Sort Results By: Published Date | Title | Company Name
By: Verio Inc.     Published Date: Oct 15, 2010
Are you getting the most from your online business? Download this guide for videos and demonstrations that show how turn your informational, online brochure into an interactive tool, with a Verio cPanel VPS Hosting solution.
Tags : verio, ecommerce, whm, vps, hosting, cpanel, vps, blogging
     Verio Inc.
By: Social Text     Published Date: Jul 21, 2009
Read this paper to learn 5 practices that ensure the collaboration solution you choose will give you the significant business results you are seeking. Collaboration solutions can accelerate cycle times by 30% across virtually every business function. These results may be critical to survival in difficult economic times, and the right collaboration solution is the single most effective way to get them.
Tags : social text, enterprise collaboration, collaboration, enterprise, tco, total cost of ownership, social networking, blogging
     Social Text
By: Social Text.     Published Date: Jul 21, 2009
Read this paper to learn 5 practices that ensure the collaboration solution you choose will give you the significant business results you are seeking. Collaboration solutions can accelerate cycle times by 30% across virtually every business function. These results may be critical to survival in difficult economic times, and the right collaboration solution is the single most effective way to get them.
Tags : social text, enterprise collaboration, collaboration, enterprise, tco, total cost of ownership, social networking, blogging
     Social Text.
By: Spredfast, Inc.     Published Date: Aug 06, 2013
The biggest areas for opportunity and resolution for social brands
Tags : spredfast, social media, advertising solutions, blog comments, blog monitoring, brand loyalty, brand management, brand positioning
     Spredfast, Inc.
By: MessageLabs     Published Date: Jun 03, 2009
Does your email and web Acceptable Usage Policy (AUP) need a refresh? Shoosmiths Solicitors and MessageLabs combine to provide you with some top tips to ensuring your policy is fit for purpose. Click here.
Tags : aup, acceptable usage policy, message labs, shoosmiths solicitors, copyright, security provisions, guidance, email usage
     MessageLabs
By: Castelle     Published Date: Nov 01, 2006
Castelle’s integration provides seamless fax integration with native Notes services like logging and reporting, and lets faxes be managed just like other Notes email, with all of Domino’s native security, administration, and customization capabilities.
Tags : ip networks, ip telephony, network management, servers, small business networks, tcp/ip protocol, contact management, messaging
     Castelle
By: PTC     Published Date: Aug 21, 2009
In today's complex global life sciences marketplace, the ability to manage product information is a daunting task. The ability to ensure greater control over this critical product information has led to the development of a standard for product information throughout the European Union. If your company as not begun to think about PIM, now is the time, download this white paper immediately.
Tags : best practices, enterprise resource planning, enterprise software, product lifecycle management, plm, pim, product information, catalog
     PTC
By: PTC     Published Date: Aug 21, 2009
In February 2004, the FDA issued a Draft Guidance requiring the electronic submission of labeling content to be provided in an XML-based format called Structured Product Labeling (SPL). The purpose of this white paper is for the reader to gain an understanding and prepare for the FDA's new electronic labeling submission standard.
Tags : best practices, enterprise software, product lifecycle management, plm, product information, product information management, pim, catalog
     PTC
By: AT&T     Published Date: Jul 28, 2015
Download this white paper to learn more about AT&T Threat Manager – with Advanced Log Management, a security logging and event correlation monitoring solution for any size organization.
Tags : threat manager, at&t, advanced log management, security logging, event correlation monitoring, hackers, cybersecurity
     AT&T
By: Unitrends     Published Date: Oct 30, 2015
Usability—much less beauty—was never a priority for backup and recovery software. All that mattered was that large and complex applications, usually diverse independent applications from multiple vendors, worked. As a result, IT staff spent countless hours slogging through poorly designed systems. But it doesn't have to be like this.
Tags : unitrends, backup software, recovery software, it staff solutions, it solutions, usability
     Unitrends
By: NeoSpire Managed Hosting     Published Date: Sep 01, 2009
When a company creates a custom web application, it also creates a custom challenge. Traditional monitoring does not cover everything, but alerts if something goes wrong with the application are more important than ever. Learn the benefits of custom application monitoring and how NeoSpire can help. . Dramatically reduces the time to troubleshoot a failed web application . Provides complete overview of web transaction and web application performance, to proactively locate and fix bottlenecks in your web system . Improves customer experience and increase customer satisfaction with excellent performance of your web applications and e-business transactions . Eliminates the risk of loss of revenue and credibility . Increases the efficiency of mission-critical e-business operations and web applications
Tags : application monitoring, load balancing system, neospire, benefits of testing, hardware monitoring, disk utilization, memory utilization, cpu load
     NeoSpire Managed Hosting
By: Blue Coat Systems     Published Date: Aug 12, 2013
The use of SSL encryption for all enterprise Internet traffic is growing steadily. Applications that make use of SSL – such as SharePoint, Exchange, WebEx, Salesforce.com and Google Apps – are commonplace. Even email applications like Gmail, Yahoo, and Zimbra are being used in workplace environments as hosted email or BYOD apps. It’s clear that organizations now need complete visibility into the SSL traffic coming across the WAN. They need the ability to preserve complete network and web histories from encrypted network and web traffic for compliance, regulatory and logging requirements. Blue Coat has solutions today to address the SSL dilemma.
Tags : blue coat, ssl, ssl visibility
     Blue Coat Systems
By: CA Technologies EMEA     Published Date: Sep 13, 2018
Introduzione CA Project & Portfolio Management (CA PPM) 15.3 consente di personalizzare i progetti per qualsiasi business unit, con la semplicità del drag-and-drop. Dal complicato workflow per HR o alla semplice gestione delle attività per le vendite, oggi i lavoratori riescono ad avviare i progetti in pochi minuti, anziché in giorni. È possibile integrare la collaborazione all'interno dell'applicazione per eliminare riunioni ridondanti, una familiare griglia di tipo Microsoft Excel® per la gestione dei budget, una nuova connessione per strumenti di Business Intelligence (BI) di terze parti che consentono di trovare risposte, e si ottiene la più moderna app di Project Portfolio Management attualmente sul mercato.
Tags : 
     CA Technologies EMEA
By: Symantec     Published Date: Nov 30, 2015
Due trend rendono oggi la firma del codice più importante che mai: il boom delle applicazioni commerciali per i dispo-sitivi mobili e desktop e la proliferazione del malware.
Tags : 
     Symantec
By: Pure Storage     Published Date: Oct 09, 2018
Oggi la continuità operativa è fondamentale per qualsiasi azienda. Le imprese sono coinvolte in una trasformazione digitale profonda e si rivolgono all’IT per tutte le attività più mission-critical. I tempi di fermo possono arrivare a paralizzare l’intera organizzazione: le aziende più resilienti sono in grado di gestire i guasti tecnologici e fare in modo che l’azienda resti sempre operativa e funzionante. Garantire la business continuity, infatti, significa garantire maggiore vantaggio competitivo, maggiore coinvolgimento dei clienti e maggiore innovazione. Tuttavia, il raggiungimento di una business continuity di alto livello, con Recovery Point Objective (RPO) e Recovery Time Objective (RTO) pari a zero, è tipica delle imprese di grandi dimensioni che, proprio perché grandi, possono sostenere gli investimenti necessari e gestire la complessità associata. Per la maggior parte delle aziende, i costi di una business continuity di alto livello sono sempre risultati eccessivi. Oggi la s
Tags : 
     Pure Storage
By: CA Technologies     Published Date: Sep 29, 2011
The identity and access management challenges that exist in the physical world - identity management, application security, access control, managing sensitive data, user activity logging, and compliance reporting - are even more critical in the virtual environments that are growing in use as IT seeks to streamline its operations and reduce operating costs. However, security risks are increased due to the nature of the virtualization environment and IT should seek to extend their security solutions from the physical server environment to the virtualization environment as seamlessly as possible. Continue reading this white paper to learn how CA Content-Aware IAM solutions help protect customers in the physical world and similarly protect virtual environments by controlling identities, access, and information usage.
Tags : technology, virtual, identity management, access control, security, protection
     CA Technologies
By: CA Technologies EMEA     Published Date: Apr 10, 2018
Una concorrenza efficace si basa sulla continuous delivery di software di qualità. Nel mondo di oggi, le applicazioni sono uno strumento indispensabile e ogni azienda deve trasformarsi in un'azienda di software, a prescindere dal settore in cui opera.
Tags : 
     CA Technologies EMEA
By: Microsoft     Published Date: Jul 07, 2016
Enable, protect, and manage mobile productivity Protecting email and other corporate data on mobile devices—without bogging down workers—is one of today’s biggest challenges faced by IT pros today. With the massive, global proliferation of mobile devices, it can be a struggle to manage and secure these devices and your data, both on approved enterprise applications and shadow IT. Download this free e-book to learn how to control the uncontrollable and create a solution that: • Enables continuous management, so your employees are more productive. • Offers threat protection, so you can detect abnormal user behavior, suspicious activities, known malicious attacks, and security issues right away. • Guards against data leakage. • Provides security after loss or theft of mobile devices. • Helps protect your Microsoft Office email, files, and apps.
Tags : mobile devices, enterprise, best practices, management
     Microsoft
By: CA Technologies EMEA     Published Date: Apr 10, 2018
L'importanza di rapidità e agility. Oggi tutti i business subiscono l'effetto dirompente di upstart digitali, che individuano nuovi modi per soddisfare nuovi requisiti di mercato battendo sul tempo aziende più affermate. Pur potendo contare su team IT di talento e anni di vantaggio nel contesto dell'architettura e dello sviluppo, rimane difficile rispondere a queste sfide utilizzando modelli tradizionali di sviluppo, centrati su applicazioni software monolitiche. È semplicemente impossibile arrivare sul mercato in modo rapido quando le applicazioni devono essere mantenute, modificate e ridimensionate come un'unica entità da team di grandi dimensioni, fortemente interdipendenti.
Tags : 
     CA Technologies EMEA
By: Verio Inc.     Published Date: Oct 15, 2010
If you think WordPress is just for blogging, think again. Download this guide for videos and demonstrations that show you how to implement custom layouts and templates, use plugins to offer added functionality and make advanced customizations to save time and development costs. Discover how to use WordPress as a CMS and quick tricks to use for putting a WordPress solution powered by a cPanel VPS hosting to work for your clients.
Tags : verio, ecommerce, whm, vps, hosting, cpanel, vps, blogging
     Verio Inc.
By: IBM Corporation     Published Date: Jun 09, 2011
This Research Brief categorizes databases as a "dangerous and growing security gap" - and offers steps to improve database security across the enterprise.
Tags : ibm, guardium, database security, risk, database discovery, vulnerability scanning, penetration testing, user monitoring
     IBM Corporation
By: ArcSight     Published Date: Mar 04, 2009
Whitepaper highlighting the twelve PCI DSS requirements and the technology necessary to address the PCI DSS 1.2 requirements.
Tags : pci dss, pci dss 1.2, log management, arcsight logger, siem, payment card industry, pci, dss
     ArcSight
By: EdgeWave     Published Date: Oct 15, 2011
This newly updated handbook is an invaluable tool for IT and HR professionals who need to establish rules for e-communications at their organizations.
Tags : e-policy best practices, web filter for enterprise, web security, email security, messaging security, best practices, handbook, edgewave
     EdgeWave
By: Splunk     Published Date: Nov 29, 2018
IT organizations struggle with numerous challenges — hybrid environments, lack of visibility during cloud migration, multiple infrastructure monitoring tools, and reliance on manual processes. Yet according to a 2018 global survey, less than half of IT practitioners are confident they can ensure performance and system availability with their current toolset. As a Splunk customer, you understand the power of running your monitoring and logging environment in a machine data platform. Are you utilizing your machine data platform to effectively run APM, infrastructure monitoring and Network performance monitoring and diagnostics? This guide outlines the 8 biggest mistakes IT practitioners make and provides solutions, key takeaways and real-world examples to help you improve IT monitoring and troubleshooting in your organization. Download your copy to learn how to: Achieve end-to-end-visibility throughout cloud migration Find trends and root cause faster with automated investigations
Tags : application performance monitoring, network tools, network monitoring tools, network monitoring software, network monitoring, it monitoring
     Splunk
By: Akamai Technologies     Published Date: Jun 14, 2018
Companies are pursuing digital transformation. The goal is to improve customer value, operate with greater efficiency and agility, and increase innovation. But as companies leverage new workflows, security has not kept pace, and cyber criminals are becoming more sophisticated. This white paper describes a security paradigm for today’s hostile environment: zero trust.
Tags : behavioral analytics, logging analytics, zero trust security model, security, cyber criminals, security breach
     Akamai Technologies
Start   Previous   1 2 3 4 5    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics